Integral Cryptanalysis (Extended abstract)

This paper considers a cryptanalytic approach called integral cryptanalysis. It can be seen as a dual to differential cryptanalysis and applies to ciphers not vulnerable to differential attacks. The method is particularly applicable to block ciphers which use bijective components only.

[1]  M. Newman,et al.  Topics in Algebra , 1978 .

[2]  Eli Biham,et al.  Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.

[3]  James L. Massey,et al.  SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm , 1993, FSE.

[4]  Lars R. Knudsen,et al.  Truncated and Higher Order Differentials , 1994, FSE.

[5]  Xuejia Lai Higher Order Derivatives and Differential Cryptanalysis , 1994 .

[6]  J. Massey,et al.  Communications and Cryptography: Two Sides of One Tapestry , 1994 .

[7]  Vincent Rijmen,et al.  The Cipher SHARK , 1996, FSE.

[8]  Lars R. Knudsen,et al.  Truncated Differentials of SAFER , 1996, FSE.

[9]  K. Sakurai,et al.  On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis (Special Section on Cryptography and Information Security) , 1997 .

[10]  Vincent Rijmen,et al.  The Block Cipher Square , 1997, FSE.

[11]  Lars R. Knudsen,et al.  The Interpolation Attack on Block Ciphers , 1997, FSE.

[12]  Mitsuru Matsui,et al.  New Block Encryption Algorithm MISTY , 1997, FSE.

[13]  Thomas Jakobson,et al.  Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree , 1998, CRYPTO.

[14]  Yupu Hu,et al.  Integral cryptanalysis of SAFER , 1999 .

[15]  Vincent Rijmen,et al.  Attack on Six Rounds of Crypton , 1999, FSE.

[16]  Bruce Schneier,et al.  Improved Cryptanalysis of Rijndael , 2000, FSE.

[17]  Yeping He,et al.  Square Attack on Reduced Camellia Cipher , 2001, ICICS.

[18]  Stefan Lucks The Saturation Attack - A Bait for Twofish , 2000, FSE.

[19]  Vincent Rijmen,et al.  Linear Frameworks for Block Ciphers , 2001, Des. Codes Cryptogr..

[20]  Alex Biryukov,et al.  Structural Cryptanalysis of SASAS , 2001, Journal of Cryptology.

[21]  Paulo S. L. M. Barreto,et al.  Improved SQUARE Attacks against Reduced-Round HIEROCRYPT , 2001, FSE.

[22]  Ulrich Kühn,et al.  Cryptanalysis of Reduced-Round MISTY , 2001, EUROCRYPT.